General
-
Target
JaffaCakes118_469539e75a1b79c4d1040e06694d41ae
-
Size
492KB
-
Sample
250128-eecy7awraq
-
MD5
469539e75a1b79c4d1040e06694d41ae
-
SHA1
f2bc92d2183cb3ea7894a81a1e195d57c25ec0c2
-
SHA256
5addb575af569a218d9ce8c88a3daefc1e343b6641c0d353f6fca2eb3a2aa715
-
SHA512
cc4e0913d0db3873a44d885ca26c1b802366bfc66bb4c2548448595b61989a2919acdb19216586f95e9ff391cd3e2225bee3647f072f1575499ad9f1112107ee
-
SSDEEP
12288:5+XbsaO1RUgWA6MKedpjpKNNzavSR5SFgeiqRKL/L:Ir7WUZA6MKSWBtHP
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_469539e75a1b79c4d1040e06694d41ae.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
JaffaCakes118_469539e75a1b79c4d1040e06694d41ae
-
Size
492KB
-
MD5
469539e75a1b79c4d1040e06694d41ae
-
SHA1
f2bc92d2183cb3ea7894a81a1e195d57c25ec0c2
-
SHA256
5addb575af569a218d9ce8c88a3daefc1e343b6641c0d353f6fca2eb3a2aa715
-
SHA512
cc4e0913d0db3873a44d885ca26c1b802366bfc66bb4c2548448595b61989a2919acdb19216586f95e9ff391cd3e2225bee3647f072f1575499ad9f1112107ee
-
SSDEEP
12288:5+XbsaO1RUgWA6MKedpjpKNNzavSR5SFgeiqRKL/L:Ir7WUZA6MKSWBtHP
-
Detect XtremeRAT payload
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1